Active Content
Outsiders supplying code to be executed on user’s machine.
Can this code be trusted?
Can it be contained?
How can we give active content enough power to be useful, while still keeping it safe?
Can users administer fine-grained controls?
Previous slide
Next slide
Back to first slide
View graphic version